Over a million developers have joined DZone.
{{announcement.body}}
{{announcement.title}}

Data Partners and the GDPR

DZone's Guide to

Data Partners and the GDPR

The GDPR is going to mean a lot of change, so here is a set of questions to ask your data partners to make sure your infrastructure doesn't get you into trouble.

· Security Zone ·
Free Resource

Protect your applications against today's increasingly sophisticated threat landscape.

By now, you should be fully aware of the GDPR’s data requirements for your own application and have read Erika Wolfe's article about what you should know. (Or read any of these links) But have you talked with your data partners? If your application takes advantage of third-party tools and components to add functionality or track user information, they need to be compliant as well. The new regulations state that data privacy needs to be maintained throughout the entire lifecycle of an application, through every data controller and processor. Take the time to ask your data partners how they ensure GDPR compliance, including their security framework and how they manage data.

If your data partners do not have a clearly defined and documented data strategy, you could be exposing your company to substantial risk. Here are a few questions to get the discussion started:

Q: Where are their servers and computers physically located? Can you choose a location?

Even if a service is cloud-based, the physical location of the servers could impact how the GDPR applies to you.

Q: How does their platform pseudonymize user data as it integrates with external systems?

When user data is integrated with their system, is new data personally identifiable, or connected to an alias? The more disconnected, the safer it will be.

Q: What is their protocol for notification in case of a data breach?

This is vital since your company will need to notify your users within 72 hours. Your provider should be able to notify you so you can comply.

Q: How do they comply with your users’ right of access and erasure?

How will your company coordinate efforts so users can view their data and request data erasure?

Questions for Identity and Access Management Partners

If you are considering an identity and access management solution like Passport, here are additional questions that will provide insights into how they address security and data privacy.

Q: What are their default password constraints, and are they adjustable?

This is a basic question to begin with. They should have a diverse set of requirements and be able to adjust them if needed.

Q: What password hash do they use, and do they use unique salts and/or peppers?

Modern standard hash algorithms like SHA-3, Bcrypt, PBKDF2 and Scrypt are designed to make brute force attacks much more difficult. If they are using standard MD5, run.

Q: How difficult is it to increase their hash’s intensity for new users? Existing users?

Hackers will always develop more sophisticated techniques, and computer processing power is always increasing. Will their system be able to adjust to protect against evolving attacks?

Q: Is their database directly accessible from outside your system?

Limiting direct access to the database is a first line of defense against exploits and attacks.

Q: Are requests within their system secure? How robust is your authentication for internal API requests?

Using a variety of authentication credentials within the system creates an added layer of security and limits what can be done if a hacker gains access.

For More Information

The GDPR is sure to bring changes to the way developers plan applications and manage partners. It doesn’t restrict the types of applications and experiences developers can build, but it does place the need for data privacy ahead of the business needs of the company.

To learn more about the GDPR and how it will impact developer’s responsibilities to maintain data privacy, read this post from identity management and profanity filter provider Inversoft, or download the Developer’s Guide to the GDPR. It covers the essential information developers need to understand to stay compliant and avoid steep fines possible under the regulation.

Rapidly detect security vulnerabilities in your web, mobile and desktop applications with IBM Application Security on Cloud. Register Now

Topics:
security ,gdpr ,data privacy ,personal information ,cloud data

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}